Главная
Study mode:
on
1
RSAConference 2019 San Francisco March 4-8 Moscone Center
2
Attacks Cause Collateral Damage
3
CIS Top 20
4
Security Automation in Three Simple Steps
5
How can we perform these steps?
6
What is an Endpoint?
7
Use SWID Tags to identify Software
8
Correlate Device Identities
9
Proposal #1: Collect Event-Driven Posture
10
Vulnerability Discovery, Exploitation and Remediation
11
ROLIE and its Use Cases
12
Leverage vulnerability information
13
Vulnerability Information and Supply Chain Risk Management
14
Vulnerability Management on the Network
15
Apply What You Have Learned Today
16
Security Content Automation Protocol (SCAP) 2.0 Update
Description:
Explore a comprehensive vision for the future of network security in this 46-minute RSA Conference talk. Learn how standardized posture information collection and security automation can revolutionize network defense against intrusions. Understand the current challenges facing security professionals, including the impact of disconnected defensive systems. Discover a three-step approach to security automation and delve into practical solutions such as SWID tags for software identification and ROLIE for vulnerability management. Gain insights into event-driven posture collection, supply chain risk management, and the latest updates on the Security Content Automation Protocol (SCAP) 2.0. Apply these concepts to strengthen your organization's network defenses and stay ahead of evolving threats.

Making Security Automation Real

RSA Conference
Add to list
0:00 / 0:00